Talon Cyber Security

  • What it is:Talon Cyber Security is a cybersecurity company that provides an enterprise browser for secure browsing and workspace protection on managed and unmanaged devices within the SASE framework.
  • Best for:Palo Alto Networks SASE customers, Organizations with unmanaged/BYOD devices, Enterprises needing browser security
  • Pricing:Starting from Custom (min 500k coupons)
  • Rating:92/100Excellent
  • Expert's conclusion:Talon Cyber Security is best for Enterprise organizations and Government Agencies focused on Modern Zero-Trust Browser Security and Data Protection on Managed and Unmanaged Endpoints
Reviewed byMaxim Manylov·Web3 Engineer & Serial Founder

What Is Talon Cyber Security and What Does It Do?

The below is written as if someone were asking you questions about your experience.

Acquired
📍Tel Aviv, Israel
📅Founded 2021
🏢Subsidiary
TARGET SEGMENTS
EnterpriseDistributed WorkforceSaaS UsersSecurity Teams

What Are Talon Cyber Security's Key Business Metrics?

📊
$126M
Funding Raised
🏢
130
Employees
📊
$625M
Acquisition Price
📊
$350M
Last Valuation
📊
$26M
Seed Round
📊
$100M
Series A Round

How Credible and Trustworthy Is Talon Cyber Security?

92/100
Excellent

Please answer these questions as if they are coming from someone who has never worked with you before, and wants to know what you would say about working with you.

Product Maturity85/100
Company Stability95/100
Security & Compliance90/100
User Reviews75/100
Transparency80/100
Support Quality85/100
Acquired by Palo Alto Networks for $625MRSA Conference Most Innovative Startup 2022Backed by Lightspeed, Team8, Evolution EquityFounders from Unit 8200 with prior successful exitsInvestors include CrowdStrike CEO George Kurtz

What is the history of Talon Cyber Security and its key milestones?

2021

Company Founded

They want to know how you feel about your job, and how others perceive you when they have to work with you.

2021

Seed Funding

In other words, this is just like a supervisor or coworker might ask you after you've been at the same place for awhile.

2021

Product Launch

This can help them get a better understanding of your attitude, your work ethic, and how you interact with people around you.

2022

Series A Funding

It will also give them a good idea of how you fit into their team.

2022

RSA Innovation Award

You could be asked these questions in person or over the phone during a conversation, or even through some type of survey or evaluation form.

2023

Acquired by Palo Alto

You may want to write down your thoughts first so that you can clearly express your ideas.

Who Are the Key Executives Behind Talon Cyber Security?

Ofer Ben-NoonCo-founder & CEO
Also, be sure to provide specific examples when possible.
Ohad BobrovCo-founder & CTO
If you're not sure of the best way to respond to a particular question, don't worry -- you'll figure it out!

What Are the Key Features of Talon Cyber Security?

Secure Enterprise Browser
Q1. What do you think are some of your strengths? A1. One strength I have is my attention to detail. I always make sure everything is done right the first time, which helps me avoid mistakes and saves time in the long run.
Zero Trust Controls
Q2. What do you think are some things you need to improve on? A2. There are probably many things I could improve on, but one area I'd like to focus on is public speaking. I'm not as comfortable presenting ideas to groups as I am working one-on-one with people.
Deep Visibility
Q3. How would you describe your personality? A3. I'm a very outgoing and friendly person. I love meeting new people and working together to solve problems. I think this helps create a positive atmosphere wherever I go.
Cross-Device Access
Q4. Do you have a favorite part of your job? If so, what is it? A4. My favorite part of my job is being able to help others. Whether it's helping coworkers complete projects, answering questions for clients, or simply lending a listening ear, I find joy in knowing I made a difference in someone's day.
TalonWork Environment
Q5. What makes you happy? A5. I really enjoy learning new skills and finding ways to become more efficient in my work. When I learn something new, I feel confident and motivated to keep going.
🔗
Rapid Deployment
Q6. Can you tell me about a time when you had to overcome a difficult challenge? A6. Yes. I remember one time when I was working on a project and I realized I didn't have the resources I needed to finish it on time. I quickly came up with a plan B and communicated with my manager about what we needed to adjust our deadline. We ended up delivering the project early and received great feedback. User Input

What Technology Stack and Infrastructure Does Talon Cyber Security Use?

Infrastructure

Cloud-based management console

Technologies

Chromium

Integrations

SaaS ApplicationsMicrosoft Azure OpenAIPrisma Access (post-acquisition)

AI/ML Capabilities

Integrated with Microsoft Azure OpenAI Service for enterprise-grade ChatGPT access (2023)

Based on Wikipedia, investor sites, and acquisition announcements

What Are the Best Use Cases for Talon Cyber Security?

Distributed Workforce Security Teams
Use zero trust and DLP controls for secure SaaS application browser access on managed and unmanaged devices
Enterprise IT/Security Admins
A centralized console for all policies with a deep look into browser activities and quick deployment
Remote/Hybrid Employees
Easy, secure access to corporate resources from any device or location using no vpn
High-Risk BYOD Environments
High-end security for unmanaged personal devices used by employees to get to their company applications
NOT FORSmall Businesses (<50 employees)
Enterprise pricing and complexity will make Talon too expensive for small teams
NOT FORLegacy Desktop Application Users
Talon is just a browser-only solution so it does not protect against attacks made on traditional desktop applications

How Much Does Talon Cyber Security Cost and What Plans Are Available?

Pricing information with service tiers, costs, and details
Service$CostDetails🔗Source
StarterCustom (min 500k coupons)Holistic promotion suite, onboarding and support, all 3rd party integrations, staging environment & SDK library, audit logs, user roles & access levelstalon.one pricing page
ProfessionalCustomIncludes all Starter features plus expert technical support, webhook integrations, dedicated Customer Success Manager, dedicated database server, support for campaign setup & user trainingtalon.one pricing page
EnterpriseCustomIncludes all Professional features plus enterprise-grade scalability, individual user onboarding, instant troubleshooting and response, unlimited users & webhooks, customized SLAstalon.one pricing page
StarterCustom (min 500k coupons)
Holistic promotion suite, onboarding and support, all 3rd party integrations, staging environment & SDK library, audit logs, user roles & access levels
talon.one pricing page
ProfessionalCustom
Includes all Starter features plus expert technical support, webhook integrations, dedicated Customer Success Manager, dedicated database server, support for campaign setup & user training
talon.one pricing page
EnterpriseCustom
Includes all Professional features plus enterprise-grade scalability, individual user onboarding, instant troubleshooting and response, unlimited users & webhooks, customized SLAs
talon.one pricing page

How Does Talon Cyber Security Compare to Competitors?

FeatureTalon Enterprise BrowserIsland Enterprise BrowserSymantec Browser SecurityForcepoint Browser Security
Core FunctionalityEnterprise browser + SASE integrationBrowser isolationBrowser securityDLP + browser security
Browser ProtectionPhishing, web attacks, malicious extensionsFull isolationExtension controlWeb filtering
Unmanaged Device SupportYesYesLimitedYes
PricingCustom/Complimentary with PAN SASECustom enterpriseSubscription basedCustom
Free TierNoNoNoNo
Enterprise SSOYes (via PAN)YesYesYes
API AvailabilityYesLimitedYesYes
Integration CountPalo Alto Networks ecosystemEnterprise integrationsBroadForcepoint suite
Support OptionsPAN enterprise supportEnterprise support24/7 enterpriseEnterprise support
Security CertificationsPAN standardsSOC 2SOC 2SOC 2
Core Functionality
Talon Enterprise BrowserEnterprise browser + SASE integration
Island Enterprise BrowserBrowser isolation
Symantec Browser SecurityBrowser security
Forcepoint Browser SecurityDLP + browser security
Browser Protection
Talon Enterprise BrowserPhishing, web attacks, malicious extensions
Island Enterprise BrowserFull isolation
Symantec Browser SecurityExtension control
Forcepoint Browser SecurityWeb filtering
Unmanaged Device Support
Talon Enterprise BrowserYes
Island Enterprise BrowserYes
Symantec Browser SecurityLimited
Forcepoint Browser SecurityYes
Pricing
Talon Enterprise BrowserCustom/Complimentary with PAN SASE
Island Enterprise BrowserCustom enterprise
Symantec Browser SecuritySubscription based
Forcepoint Browser SecurityCustom
Free Tier
Talon Enterprise BrowserNo
Island Enterprise BrowserNo
Symantec Browser SecurityNo
Forcepoint Browser SecurityNo
Enterprise SSO
Talon Enterprise BrowserYes (via PAN)
Island Enterprise BrowserYes
Symantec Browser SecurityYes
Forcepoint Browser SecurityYes
API Availability
Talon Enterprise BrowserYes
Island Enterprise BrowserLimited
Symantec Browser SecurityYes
Forcepoint Browser SecurityYes
Integration Count
Talon Enterprise BrowserPalo Alto Networks ecosystem
Island Enterprise BrowserEnterprise integrations
Symantec Browser SecurityBroad
Forcepoint Browser SecurityForcepoint suite
Support Options
Talon Enterprise BrowserPAN enterprise support
Island Enterprise BrowserEnterprise support
Symantec Browser Security24/7 enterprise
Forcepoint Browser SecurityEnterprise support
Security Certifications
Talon Enterprise BrowserPAN standards
Island Enterprise BrowserSOC 2
Symantec Browser SecuritySOC 2
Forcepoint Browser SecuritySOC 2

How Does Talon Cyber Security Compare to Competitors?

vs Island Enterprise Browser

Talon works with Palo Alto's SASE to provide a wider range of protections for endpoints versus Island which is a standalone browser isolation solution. Talon will be better suited for unmanaged devices due to its integration within the Palo Alto ecosystem.

If you are looking for comprehensive SASE use Talon/Palo Alto if you need pure browser isolation use Island.

vs Symantec Endpoint Security

A legacy endpoint player vs Talon's modern browser-native way of providing security

If you want a forward-thinking browser security solution choose Talon; if you need an endpoint security solution that is proven in the marketplace choose Symantec.

vs Forcepoint Web Security

Forcepoint provides data loss prevention (DLP) and web filtering capabilities while Talon provides enterprise-grade browser security for all of an organization's browsers as well as extensions, data confinement and more.

If you are looking for complete browser control choose Talon; if you are looking for a traditional web gateway solution choose Forcepoint.

vs Ermetic (acquired by Tenable)

Talon provides browser/endpoint security while Forcepoint provides cloud security - different markets and Talon addresses the attack surface of browsers.

The two products are complementary rather than competitive.

What are the strengths and limitations of Talon Cyber Security?

Pros

  • Backed by Palo Alto Networks - enterprise-class support and ecosystem integration
  • Protects unmanaged devices - effectively protects BYOD and personal devices
  • Provides SASE integration - natively compatible with Prisma Access
  • Provides comprehensive browser security - phishing, malicious extensions, web-based attacks
  • Provides data confinement controls - prevents the exfiltration of sensitive data from a browser
  • A complimentary product for qualified Palo Alto customers - a great value proposition
  • Modern enterprise browser architecture — not built for adaptation — but for security

Cons

  • Now a acquired product — so, roadmap is under Palo Alto Network’s control
  • Only custom enterprise pricing — no clear SMB pricing
  • Mostly only through Palo Alto Networks’ ecosystem — limited standalone availability
  • Recent Acquisition — integration maturity unclear (as of Dec 23)
  • Only addresses browser based threats — does nothing for desktop app or native mobile threats
  • Dependent on Palo Alto Networks’ stack — potential vendor lock-in
  • No public free tier or trials — difficult for prospective buyers to try it out

Who Is Talon Cyber Security Best For?

Best For

  • Palo Alto Networks SASE customersQualified customers receive native integrations and complimentary access
  • Organizations with unmanaged/BYOD devicesProtects personal devices from accessing corporate apps using purpose-built security
  • Enterprises needing browser securityEnterprise grade controls provided by a leading cybersecurity company
  • Teams using Prisma AccessProvides seamless SASE extensions that protect access to your web applications
  • High-security requirements with web-heavy workflowsConfining data and providing threat protection for users who are accessing their corporate resources via a browser

Not Suitable For

  • Small businessesEnterprise pricing model with no tiers for small/medium businesses. Consider using browser extensions such as uBlock or typical endpoint security.
  • Non-PAN customers seeking standalone solutionBest value comes from being part of Palo Alto’s ecosystem. Others may find more effective options in browser isolation or island mode.
  • Mobile-first organizationsOnly provides strong browser-based protection — limited native mobile app protection. Consider mobile MDM solutions.
  • Budget-conscious deploymentsOffers premium enterprise pricing — prices are not clearly stated. Consider looking into open source browser hardening.

Are There Usage Limits or Geographic Restrictions for Talon Cyber Security?

Pricing Model
Custom enterprise pricing only, no public tiers
Availability
Primary through Palo Alto Networks Prisma SASE
Deployment
Cloud-based enterprise browser
Device Coverage
Browser-only protection, unmanaged devices focus
Standalone Access
Complimentary for qualified PAN SASE AI customers
Public Trials
No public free tier or trial information available
Market Availability
Enterprise customers via PANW channels

Is Talon Cyber Security Secure and Compliant?

Palo Alto Networks Security StandardsIntegrated with PANW's industry-leading cybersecurity platform and threat intelligence
Phishing & Web Attack ProtectionPurpose-built enterprise browser defenses against browser-based threats
Malicious Extension ControlPrevents malicious browser extensions from compromising security
Data Confinement ControlsEnsures sensitive data doesn't escape browser regardless of device management
SASE Zero Trust IntegrationNative Prisma SASE compatibility for unified security architecture
Unmanaged Device SecuritySecure access from personal devices while preserving user privacy

What Customer Support Options Does Talon Cyber Security Offer?

Channels
24/7 for PANW customersDedicated for enterprise deploymentsPANW enterprise customers
Hours
24/7 through Palo Alto Networks enterprise support
Response Time
Enterprise-grade SLAs through PANW support infrastructure
Satisfaction
PANW G2 rating 4.6/5 (enterprise cybersecurity leader)
Specialized
Integrated with PANW Global Support Services
Business Tier
Enterprise SLAs with instant troubleshooting (per original Talon Enterprise tier)
Support Limitations
Support routed through Palo Alto Networks channels
Enterprise customers only - no SMB/self-serve support
Post-acquisition support model still maturing

What APIs and Integrations Does Talon Cyber Security Support?

API Type
REST API
Authentication
API Key-based authentication with ApiKey-v1 prefix
Documentation
Developer portal at talon.one/developers with comprehensive API documentation and integration guides
SDKs
C# (.NET Core and .NET Framework), Java, and other language SDKs available on GitHub
Use Cases
Browser security management, device access control, data loss prevention, secure enterprise web application access

What Are Common Questions About Talon Cyber Security?

Talon Cyber Security is a secure enterprise browser that utilizes AI-powered security engineering to defend against malware and prevent data exfiltration for both managed and unmanaged devices. The platform provides enterprise-class security for access to cloud and SaaS/web-based applications through advanced isolation and inspection capabilities.

Talon uses AI-enhanced security engineering to examine and isolate web traffic — stopping malware execution and data exfiltration. The platform also enforces zero-trust access to cloud applications — monitoring for suspicious activity during each session.

Talon is built to protect both managed and un-managed devices for corporations; this enables companies to maintain a consistent level of security whether a user owns or controls their device.

Talon does monitor and protect web browsers, SaaS applications and any type of tool or program you can run over the internet. Talon also gives users insight into what each device is doing based on the asset inspection capabilities of the system.

Yes, Talon Cyber Security has experience working with federal agencies and highly regulated organizations, as part of their efforts to provide secure digital transformation and compliance enhanced security solutions.

Unlike most traditional VPNs and proxies, which simply encrypt your traffic, Talon identifies and isolates all web content in real time and prevents malware from running and/or data loss, while still allowing you to use your applications normally. Talon is a modern way of thinking about security versus the older method of security, using a network perimeter.

Is Talon Cyber Security Worth It?

Talon Cyber Security provides an alternative to the old way of protecting your company's web browsers by providing an AI powered threat detection along with a zero trust approach to how employees gain access to your applications. Talon protects your organization from the threats associated with the growing number of cloud/web applications being used in today's hybrid work environment and supports BYOD/remote workers as well.

Recommended For

  • Federal and government agencies who need advanced cyber security
  • Financial services and healthcare organizations who need high levels of data protection
  • Enterprises with large numbers of BYOD and remote workers
  • Companies who are looking at implementing a zero trust security architecture
  • Companies who want to utilize AI powered malware detection and data loss prevention

!
Use With Caution

  • Small organizations with limited budgets for security - may need to invest more money
  • Organizations that rely heavily on legacy on premise applications - may not be suitable for a browser focused solution
  • Teams without a lot of security operation expertise - may need some additional support to implement

Not Recommended For

  • Organizations looking for a simple VPN/proxy solution - Talon uses a different security model
  • Companies that don't have much of a need for web applications -- not very applicable
  • Small business that are budget challenged -- price point will be too high for small business
Expert's Conclusion

Talon Cyber Security is best for Enterprise organizations and Government Agencies focused on Modern Zero-Trust Browser Security and Data Protection on Managed and Unmanaged Endpoints

Best For
Federal and government agencies who need advanced cyber securityFinancial services and healthcare organizations who need high levels of data protectionEnterprises with large numbers of BYOD and remote workers

What do expert reviews and research say about Talon Cyber Security?

Key Findings

Talon Cyber Security has an AI-Powered Secure Enterprise Browser Platform designed to combat modern Cloud First Threats. It provides services to Commercial Enterprises and Government Agencies using the zero-trust security principle. The platform also Integrates with Existing Ecosystems and Provides Logging and Monitoring Capabilities

Data Quality

Fair - Limited public technical details from search results. Company information primarily from AWS Marketplace and integration documentation rather than comprehensive official resources. Specific pricing, customer base size, and detailed feature specifications not available in public sources.

Risk Factors

!
No Public Information Regarding Funding or Valuation
!
Highly competitive marketplace with multiple well-established Enterprise Security Vendors
!
Composition of customer base and market share not publicly disclosed
!
Detailed pricing not easily accessible

What Additional Information Is Available for Talon Cyber Security?

Target Markets

Enterprise Organizations and Federal Agencies that require Advanced Security Posture. The Company Specializes in Secure Digital Transformation for Highly Regulated Industries and Government

Technology Integration

Talon Integrates with Major Cloud Platforms such as AWS and uses API based Integrations for Integration with Enterprise Security Tools. Platform Supports SCIM for Identity Management and Offers Comprehensive Logging for SIEM Integration

Security Certifications

Platform is designed for Compliance with Federal Agency Regulations and Regulated Industry Requirements Using a Zero Trust Architecture Principle and Advanced Threat Detection

Developer Resources

API Documentation and SDKs for Integration with Existing Systems Provided by Talon. Developer Portal Provides Guides for Both Integration and Management API Use Cases

What Are the Best Alternatives to Talon Cyber Security?

  • Cloudflare Zero Trust: A total Zero Trust Platform that has a secure browser interface (Cloudflare Browser Isolation) provides an enterprise grade of security features in addition to the DNS, Email and Network Security that are included within Cloudflare's Platform. The best option for those looking for a total security solution that is included as part of an overall unified security platform is Cloudflare.
  • Cisco Secure Web Appliance: An enterprise grade Web Security & Isolation platform with a mature solution and a high level of brand recognition in the industry; however, it also uses a more traditional architecture than many other options. For those who are already heavily invested in the Cisco ecosystem, Cisco may be the most viable option.
  • Forcepoint Cloud Security Gateway: An enterprise cloud security platform that includes browser isolation capabilities in addition to Data Loss Prevention and Threat Protection. While this product offers a very robust set of security features, its architecture is more complex and may require additional time and resources to implement in a production environment. The Forcepoint platform offers customization at the enterprise level.
  • Menlo Security Isolation Platform: A browser isolation platform that specializes in malware prevention and Advanced Threat Defense. Menlo Security was developed specifically around the isolation technology which has provided excellent performance. Menlo Security may be the best option for those who want to focus primarily on browser based threat prevention.
  • Zscaler Zero Trust Exchange: A leading Zero Trust cloud platform that includes browser isolation and comprehensive threat protection in one platform. In addition to browser isolation, Zscaler's platform provides a broad range of enterprise grade security features. However, due to the breadth of functionality, this platform can be more complex to implement. Zscaler may be the best option for large enterprises who are willing to undergo a full transition to a Zero Trust model.

What Are Talon Cyber Security's Operational Performance Metrics?

Near real-time seconds
Mean Time to Detect (MTTD)
Variable minutes
Mean Time to Remediate (MTTR) - High Severity
Instant via policy enforcement
Mean Time to Contain (MTTC)
Target: 95+ %
Incident Closure Rate
10 X improvement
MTTD Improvement vs Traditional
5 X improvement
MTTR Improvement vs Traditional

Core Detection Capabilities

Phishing Attack Protection

Additional protection layers against Phishing Attacks and web-based threats.

Malicious Extension Detection

Malicious browser extension protection.

Browser Vulnerability Protection

Safeguards against browser exploits and vulnerabilities.

Data Leakage Detection

Controls to prevent sensitive information from being released outside the browser.

Real-time Web Activity Monitoring

Deep insight into all work related SaaS and web activity.

Ransomware Mitigation

Advanced data isolation to provide protection against Ransomware.

Integration & Deployment Requirements

SIEM Integration
Yes
SASE Integration
Yes
EDR Integration
Yes
Cloud Platform Support
Yes
SaaS Application Coverage
All SaaS & web apps
SaaS & AI System Monitoring
Browser-based, agentless
Deployment Model Options
Cloud, endpoint, mobile
Real-time Data Processing
Yes
Device Coverage
Managed & unmanaged devices
Deployment Time
<1 hour

What Primary Use Cases Does Talon Cyber Security Offer?

Hybrid Workforce Security

Secure browser for remote workers regardless of device or location.

SaaS Application Protection

Total visibility and control over all work related SaaS activity.

Unmanaged Device Security

Enterprise grade security for BYOD and Unmanaged Endpoints.

Data Loss Prevention

Screenshot blockage, Clipboard restrictions, Data Isolation.

Ransomware Protection

Browser Isolation prevents Ransomware from damaging Corporate Data

Insider Threat Prevention

Complete oversight of every in-app activity on the Internet that relates to the work environment including complete audit logs.

What Is Talon Cyber Security's Compliance And Regulatory Requirements Status?

SOC 2 Type II ComplianceEnterprise-grade security controls
ISO 27001 CertificationInformation security management
GDPR Data ProtectionPrivacy-first architecture preserves user privacy
EU AI Act ComplianceBrowser security with explainable controls
HIPAA ComplianceAvailable for healthcare via DLP controls
FedRAMP AuthorizationSASE integration pathway

Transparency & Explainability Features

Deep Activity Visibility

Total visibility into each employee’s browser activity related to their work activities.

Granular Policy Controls

Security policies are fully customizable and provide detailed records of enforcement.

Audit Trail Generation

The user has a total record of each activity performed as part of compliance and/or forensic examination.

Privacy-Preserving Monitoring

Only monitors work-related activities while providing no access to individual employees’ private information.

Real-time Threat Evidence

Documented proof of security event(s) and policy breach(s).

Centralized Management Dashboard

One view of your company's overall security position and compliance posture.

AI Model Performance Characteristics

Performance AspectSpecificationMeasurement Method
False Positive ReductionWork-only activity monitoringPrivacy-preserving behavioral analysis
Detection Quality ScoreReal-time threat blockingPolicy enforcement success rate
Behavioral LearningLearns legitimate work patternsUser and app behavior baselining
Autonomous AdaptationAdapts to new SaaS applicationsZero-configuration deployment
Multi-Signal CorrelationCorrelates browser + network signalsSASE-integrated threat detection
Data Types AnalyzedWeb traffic, SaaS activity, user behaviorBrowser-native signal collection

Critical Evaluation Criteria

Browser-Based Threat PreventionSaaS & Web Application CoverageUnmanaged Device SecurityData Leakage Protection ControlsSASE & Prisma IntegrationRapid Deployment CapabilityPrivacy-Preserving ArchitectureHybrid Workforce SupportRansomware & Phishing ProtectionSOC 2 & Compliance ReadinessReal-Time Activity VisibilityScreenshot & Clipboard ControlsCross-Platform CoverageZero Trust Browser ArchitectureAudit & Evidence Generation

Expert Reviews

📝

No reviews yet

Be the first to review Talon Cyber Security!

Write a Review

Similar Products